Analysis
-
max time kernel
58s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
14/10/2022, 10:30
Behavioral task
behavioral1
Sample
b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe
Resource
win10v2004-20220901-en
General
-
Target
b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe
-
Size
2.0MB
-
MD5
6a9ecae73e03c232e6a8a2fd7721aadb
-
SHA1
ccb49814d1d47518383d07479683cc3d4d86e8df
-
SHA256
b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685
-
SHA512
54eab337adf92625c90c5b429f08cb41ac40ed8aa4d44f6f008a086e691f856dd45a7cbfd7464cd39d9808b012c248a2af23e12ea8d1cd96c3b9e12498b6022d
-
SSDEEP
24576:yDyTFtjBDyTFtjsDyTFtjBDyTFtjmDyTFtjBDyTFtjtDyTFtjBDyTFtjsDyTFtjB:/tqthtqtHtqt+tqthtqtHtqt
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1240 tmp7082258.exe 1732 tmp7082429.exe 2032 tmp7082601.exe 432 tmp7082850.exe 892 notpad.exe 1800 tmp7083521.exe 572 tmp7083552.exe 948 notpad.exe 1576 tmp7083771.exe 1960 tmp7083927.exe 624 notpad.exe 1352 tmp7085284.exe 996 tmp7085596.exe 1712 notpad.exe 1568 tmp7087375.exe 1572 tmp7087858.exe 1972 notpad.exe 276 tmp7088420.exe 1132 tmp7088357.exe 2036 tmp7088529.exe 1976 notpad.exe 1284 tmp7088482.exe 1176 tmp7088669.exe 860 tmp7088654.exe 1760 tmp7088747.exe 884 notpad.exe 1476 tmp7088794.exe 1016 tmp7088919.exe 1612 tmp7089059.exe 1772 tmp7089028.exe 392 notpad.exe 596 tmp7089325.exe 948 tmp7089137.exe 824 notpad.exe 1812 tmp7090417.exe 680 tmp7091009.exe 2016 tmp7091165.exe 1044 tmp7091368.exe 1120 tmp7091321.exe 1624 notpad.exe 1672 tmp7091696.exe 996 tmp7091446.exe 1928 tmp7091992.exe 944 tmp7091805.exe 1400 tmp7092133.exe 1260 notpad.exe 1264 tmp7092086.exe 560 tmp7092507.exe 1564 tmp7092554.exe 1588 tmp7092632.exe 2032 notpad.exe 452 tmp7092725.exe 580 tmp7093022.exe 1652 tmp7093256.exe 1372 notpad.exe 1976 tmp7093381.exe 1692 tmp7093708.exe 284 tmp7093817.exe 1476 notpad.exe 1160 tmp7094036.exe 1512 notpad.exe 1576 tmp7094379.exe 884 tmp7094535.exe 900 tmp7094769.exe -
resource yara_rule behavioral1/files/0x000b0000000122d6-61.dat upx behavioral1/files/0x000b0000000122d6-59.dat upx behavioral1/files/0x000b0000000122d6-58.dat upx behavioral1/files/0x000b0000000122d6-64.dat upx behavioral1/memory/1204-63-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1732-74-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00090000000122e2-83.dat upx behavioral1/files/0x00090000000122e2-96.dat upx behavioral1/files/0x00090000000122e2-97.dat upx behavioral1/files/0x00090000000122e2-100.dat upx behavioral1/files/0x00090000000122e2-120.dat upx behavioral1/files/0x00090000000122e2-118.dat upx behavioral1/files/0x00090000000122e2-116.dat upx behavioral1/memory/948-112-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00080000000122e0-107.dat upx behavioral1/files/0x00080000000122e0-127.dat upx behavioral1/files/0x00080000000122e0-91.dat upx behavioral1/memory/892-99-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00090000000122e2-82.dat upx behavioral1/files/0x00090000000122e2-80.dat upx behavioral1/files/0x00090000000122e2-79.dat upx behavioral1/memory/624-133-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x000a0000000122e2-134.dat upx behavioral1/files/0x000a0000000122e2-137.dat upx behavioral1/files/0x000a0000000122e2-135.dat upx behavioral1/files/0x000a0000000122e2-138.dat upx behavioral1/files/0x00080000000122e0-144.dat upx behavioral1/files/0x00080000000122f5-147.dat upx behavioral1/files/0x00080000000122f5-150.dat upx behavioral1/memory/1712-151-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/files/0x00080000000122f5-148.dat upx behavioral1/memory/1572-161-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1972-162-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1976-165-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1284-167-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1976-172-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1284-173-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1760-179-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/884-185-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/392-186-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/884-188-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/392-192-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/948-198-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1812-206-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/824-205-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/996-213-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1624-217-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1624-218-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1264-225-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1260-229-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/2032-236-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/452-239-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1372-241-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1976-243-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1976-252-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1372-253-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1476-254-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1512-257-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1520-259-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/428-260-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1576-261-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/948-262-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1520-265-0x0000000000400000-0x000000000041F000-memory.dmp upx behavioral1/memory/1576-266-0x0000000000400000-0x000000000041F000-memory.dmp upx -
Loads dropped DLL 64 IoCs
pid Process 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 1732 tmp7082429.exe 1732 tmp7082429.exe 1732 tmp7082429.exe 1732 tmp7082429.exe 520 WerFault.exe 520 WerFault.exe 1240 tmp7082258.exe 1240 tmp7082258.exe 892 notpad.exe 892 notpad.exe 892 notpad.exe 1800 tmp7083521.exe 1800 tmp7083521.exe 948 notpad.exe 948 notpad.exe 948 notpad.exe 520 WerFault.exe 1576 tmp7083771.exe 1576 tmp7083771.exe 624 notpad.exe 624 notpad.exe 624 notpad.exe 1352 tmp7085284.exe 1352 tmp7085284.exe 1712 notpad.exe 1712 notpad.exe 1712 notpad.exe 1712 notpad.exe 1568 tmp7087375.exe 1568 tmp7087375.exe 1572 tmp7087858.exe 1572 tmp7087858.exe 1972 notpad.exe 1972 notpad.exe 1572 tmp7087858.exe 276 tmp7088420.exe 276 tmp7088420.exe 1972 notpad.exe 1972 notpad.exe 1976 notpad.exe 1284 tmp7088482.exe 1284 tmp7088482.exe 1976 notpad.exe 1976 notpad.exe 1176 tmp7088669.exe 1976 notpad.exe 1284 tmp7088482.exe 1176 tmp7088669.exe 1760 tmp7088747.exe 1760 tmp7088747.exe 884 notpad.exe 1760 tmp7088747.exe 884 notpad.exe 1016 tmp7088919.exe 1016 tmp7088919.exe 392 notpad.exe 392 notpad.exe 884 notpad.exe 884 notpad.exe 596 tmp7089325.exe -
Drops file in System32 directory 64 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7122724.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7091992.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7133878.exe File created C:\Windows\SysWOW64\notpad.exe tmp7140727.exe File created C:\Windows\SysWOW64\notpad.exe notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7194781.exe File created C:\Windows\SysWOW64\notpad.exe tmp7083521.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7142256.exe File created C:\Windows\SysWOW64\notpad.exe tmp7176498.exe File created C:\Windows\SysWOW64\notpad.exe tmp7088420.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7150009.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7140727.exe File created C:\Windows\SysWOW64\notpad.exe tmp7144268.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7203346.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7176498.exe File created C:\Windows\SysWOW64\notpad.exe tmp7122724.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7140618.exe File created C:\Windows\SysWOW64\notpad.exe tmp7182270.exe File created C:\Windows\SysWOW64\notpad.exe tmp7203346.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7093256.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7088919.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7082258.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7096079.exe File created C:\Windows\SysWOW64\notpad.exe- notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7091992.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7150009.exe File created C:\Windows\SysWOW64\notpad.exe tmp7119760.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7140618.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7194781.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7203346.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7096079.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7093256.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp notpad.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7104254.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7139666.exe File created C:\Windows\SysWOW64\notpad.exe tmp7158885.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7144268.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7182270.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7082258.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7176498.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp notpad.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7109090.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7144268.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7093022.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7124238.exe File created C:\Windows\SysWOW64\notpad.exe notpad.exe File created C:\Windows\SysWOW64\notpad.exe tmp7092507.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7148496.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7140727.exe File created C:\Windows\SysWOW64\notpad.exe tmp7165952.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7120369.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7083771.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7149011.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp notpad.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7184594.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7083521.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7092507.exe File opened for modification C:\Windows\SysWOW64\fsb.tmp tmp7093817.exe File created C:\Windows\SysWOW64\notpad.exe tmp7141210.exe File created C:\Windows\SysWOW64\notpad.exe- tmp7151569.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Program crash 1 IoCs
pid pid_target Process 520 432 WerFault.exe -
Modifies registry class 57 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7100775.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7083521.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7088420.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7109090.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7144268.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7182270.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7176498.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7092507.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7174220.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7203346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7091009.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7122724.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7119760.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7165952.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7148730.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7182941.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7105003.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7142256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7108185.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7195468.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7082258.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7141210.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7151569.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7140618.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7175000.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7088919.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7140228.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7120369.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7184594.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7083771.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7093256.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7094036.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7104254.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7149011.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7140727.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7194781.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7089325.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7093022.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7093817.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7126188.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7150009.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7158885.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7088669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7091992.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7096079.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7133878.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7139666.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7085284.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7087375.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7124238.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" tmp7148496.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\txtfile\shell\open\command\ = "%SystemRoot%\\system32\\NOTPAD.EXE %1" notpad.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1240 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 28 PID 1204 wrote to memory of 1240 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 28 PID 1204 wrote to memory of 1240 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 28 PID 1204 wrote to memory of 1240 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 28 PID 1204 wrote to memory of 1732 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 29 PID 1204 wrote to memory of 1732 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 29 PID 1204 wrote to memory of 1732 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 29 PID 1204 wrote to memory of 1732 1204 b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe 29 PID 1732 wrote to memory of 2032 1732 tmp7082429.exe 32 PID 1732 wrote to memory of 2032 1732 tmp7082429.exe 32 PID 1732 wrote to memory of 2032 1732 tmp7082429.exe 32 PID 1732 wrote to memory of 2032 1732 tmp7082429.exe 32 PID 1732 wrote to memory of 432 1732 tmp7082429.exe 31 PID 1732 wrote to memory of 432 1732 tmp7082429.exe 31 PID 1732 wrote to memory of 432 1732 tmp7082429.exe 31 PID 1732 wrote to memory of 432 1732 tmp7082429.exe 31 PID 432 wrote to memory of 520 432 tmp7082850.exe 30 PID 432 wrote to memory of 520 432 tmp7082850.exe 30 PID 432 wrote to memory of 520 432 tmp7082850.exe 30 PID 432 wrote to memory of 520 432 tmp7082850.exe 30 PID 1240 wrote to memory of 892 1240 tmp7082258.exe 33 PID 1240 wrote to memory of 892 1240 tmp7082258.exe 33 PID 1240 wrote to memory of 892 1240 tmp7082258.exe 33 PID 1240 wrote to memory of 892 1240 tmp7082258.exe 33 PID 892 wrote to memory of 1800 892 notpad.exe 41 PID 892 wrote to memory of 1800 892 notpad.exe 41 PID 892 wrote to memory of 1800 892 notpad.exe 41 PID 892 wrote to memory of 1800 892 notpad.exe 41 PID 892 wrote to memory of 572 892 notpad.exe 34 PID 892 wrote to memory of 572 892 notpad.exe 34 PID 892 wrote to memory of 572 892 notpad.exe 34 PID 892 wrote to memory of 572 892 notpad.exe 34 PID 1800 wrote to memory of 948 1800 tmp7083521.exe 40 PID 1800 wrote to memory of 948 1800 tmp7083521.exe 40 PID 1800 wrote to memory of 948 1800 tmp7083521.exe 40 PID 1800 wrote to memory of 948 1800 tmp7083521.exe 40 PID 948 wrote to memory of 1576 948 notpad.exe 35 PID 948 wrote to memory of 1576 948 notpad.exe 35 PID 948 wrote to memory of 1576 948 notpad.exe 35 PID 948 wrote to memory of 1576 948 notpad.exe 35 PID 948 wrote to memory of 1960 948 notpad.exe 38 PID 948 wrote to memory of 1960 948 notpad.exe 38 PID 948 wrote to memory of 1960 948 notpad.exe 38 PID 948 wrote to memory of 1960 948 notpad.exe 38 PID 1576 wrote to memory of 624 1576 tmp7083771.exe 37 PID 1576 wrote to memory of 624 1576 tmp7083771.exe 37 PID 1576 wrote to memory of 624 1576 tmp7083771.exe 37 PID 1576 wrote to memory of 624 1576 tmp7083771.exe 37 PID 624 wrote to memory of 1352 624 notpad.exe 36 PID 624 wrote to memory of 1352 624 notpad.exe 36 PID 624 wrote to memory of 1352 624 notpad.exe 36 PID 624 wrote to memory of 1352 624 notpad.exe 36 PID 624 wrote to memory of 996 624 notpad.exe 39 PID 624 wrote to memory of 996 624 notpad.exe 39 PID 624 wrote to memory of 996 624 notpad.exe 39 PID 624 wrote to memory of 996 624 notpad.exe 39 PID 1352 wrote to memory of 1712 1352 tmp7085284.exe 42 PID 1352 wrote to memory of 1712 1352 tmp7085284.exe 42 PID 1352 wrote to memory of 1712 1352 tmp7085284.exe 42 PID 1352 wrote to memory of 1712 1352 tmp7085284.exe 42 PID 1712 wrote to memory of 1568 1712 notpad.exe 43 PID 1712 wrote to memory of 1568 1712 notpad.exe 43 PID 1712 wrote to memory of 1568 1712 notpad.exe 43 PID 1712 wrote to memory of 1568 1712 notpad.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe"C:\Users\Admin\AppData\Local\Temp\b504bc57bfe2a1fe0cd9003c9a83af156b71da659547276fb22ef5a07b398685.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\tmp7082258.exeC:\Users\Admin\AppData\Local\Temp\tmp7082258.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1240 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:892 -
C:\Users\Admin\AppData\Local\Temp\tmp7083552.exeC:\Users\Admin\AppData\Local\Temp\tmp7083552.exe4⤵
- Executes dropped EXE
PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7083521.exeC:\Users\Admin\AppData\Local\Temp\tmp7083521.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7082429.exeC:\Users\Admin\AppData\Local\Temp\tmp7082429.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\tmp7082850.exeC:\Users\Admin\AppData\Local\Temp\tmp7082850.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:432
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7082601.exeC:\Users\Admin\AppData\Local\Temp\tmp7082601.exe3⤵
- Executes dropped EXE
PID:2032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 432 -s 361⤵
- Loads dropped DLL
- Program crash
PID:520
-
C:\Users\Admin\AppData\Local\Temp\tmp7083771.exeC:\Users\Admin\AppData\Local\Temp\tmp7083771.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Local\Temp\tmp7085596.exeC:\Users\Admin\AppData\Local\Temp\tmp7085596.exe3⤵
- Executes dropped EXE
PID:996
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7085284.exeC:\Users\Admin\AppData\Local\Temp\tmp7085284.exe1⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\tmp7087375.exeC:\Users\Admin\AppData\Local\Temp\tmp7087375.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1568 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\tmp7088420.exeC:\Users\Admin\AppData\Local\Temp\tmp7088420.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Modifies registry class
PID:276 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\tmp7088669.exeC:\Users\Admin\AppData\Local\Temp\tmp7088669.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
PID:1176 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:884 -
C:\Users\Admin\AppData\Local\Temp\tmp7089028.exeC:\Users\Admin\AppData\Local\Temp\tmp7089028.exe9⤵
- Executes dropped EXE
PID:1772
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7089137.exeC:\Users\Admin\AppData\Local\Temp\tmp7089137.exe9⤵
- Executes dropped EXE
PID:948 -
C:\Users\Admin\AppData\Local\Temp\tmp7091009.exeC:\Users\Admin\AppData\Local\Temp\tmp7091009.exe10⤵
- Executes dropped EXE
- Modifies registry class
PID:680 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"11⤵
- Executes dropped EXE
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\tmp7091805.exeC:\Users\Admin\AppData\Local\Temp\tmp7091805.exe12⤵
- Executes dropped EXE
PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7092086.exeC:\Users\Admin\AppData\Local\Temp\tmp7092086.exe12⤵
- Executes dropped EXE
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\tmp7092507.exeC:\Users\Admin\AppData\Local\Temp\tmp7092507.exe13⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:560 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"14⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\tmp7093022.exeC:\Users\Admin\AppData\Local\Temp\tmp7093022.exe15⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:580 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"16⤵
- Executes dropped EXE
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\tmp7093817.exeC:\Users\Admin\AppData\Local\Temp\tmp7093817.exe17⤵
- Executes dropped EXE
- Drops file in System32 directory
- Modifies registry class
PID:284 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"18⤵
- Executes dropped EXE
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\tmp7094863.exeC:\Users\Admin\AppData\Local\Temp\tmp7094863.exe19⤵PID:596
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7095253.exeC:\Users\Admin\AppData\Local\Temp\tmp7095253.exe19⤵PID:428
-
C:\Users\Admin\AppData\Local\Temp\tmp7096423.exeC:\Users\Admin\AppData\Local\Temp\tmp7096423.exe20⤵PID:1256
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"21⤵PID:560
-
C:\Users\Admin\AppData\Local\Temp\tmp7100775.exeC:\Users\Admin\AppData\Local\Temp\tmp7100775.exe22⤵
- Modifies registry class
PID:1636 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"23⤵PID:1472
-
C:\Users\Admin\AppData\Local\Temp\tmp7103224.exeC:\Users\Admin\AppData\Local\Temp\tmp7103224.exe24⤵PID:392
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7103552.exeC:\Users\Admin\AppData\Local\Temp\tmp7103552.exe24⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\tmp7104254.exeC:\Users\Admin\AppData\Local\Temp\tmp7104254.exe25⤵
- Drops file in System32 directory
- Modifies registry class
PID:1120 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"26⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\tmp7105970.exeC:\Users\Admin\AppData\Local\Temp\tmp7105970.exe27⤵PID:1960
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7106204.exeC:\Users\Admin\AppData\Local\Temp\tmp7106204.exe27⤵PID:2028
-
C:\Users\Admin\AppData\Local\Temp\tmp7106625.exeC:\Users\Admin\AppData\Local\Temp\tmp7106625.exe28⤵PID:1264
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7106999.exeC:\Users\Admin\AppData\Local\Temp\tmp7106999.exe28⤵PID:1872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7105049.exeC:\Users\Admin\AppData\Local\Temp\tmp7105049.exe25⤵PID:1520
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7102148.exeC:\Users\Admin\AppData\Local\Temp\tmp7102148.exe22⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\tmp7102959.exeC:\Users\Admin\AppData\Local\Temp\tmp7102959.exe23⤵PID:796
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7103614.exeC:\Users\Admin\AppData\Local\Temp\tmp7103614.exe23⤵PID:1372
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7099652.exeC:\Users\Admin\AppData\Local\Temp\tmp7099652.exe20⤵PID:1872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7094379.exeC:\Users\Admin\AppData\Local\Temp\tmp7094379.exe17⤵
- Executes dropped EXE
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\tmp7095237.exeC:\Users\Admin\AppData\Local\Temp\tmp7095237.exe18⤵PID:1776
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"19⤵PID:1812
-
C:\Users\Admin\AppData\Local\Temp\tmp7096844.exeC:\Users\Admin\AppData\Local\Temp\tmp7096844.exe20⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7099667.exeC:\Users\Admin\AppData\Local\Temp\tmp7099667.exe20⤵PID:1732
-
C:\Users\Admin\AppData\Local\Temp\tmp7100728.exeC:\Users\Admin\AppData\Local\Temp\tmp7100728.exe21⤵PID:276
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"22⤵PID:664
-
C:\Users\Admin\AppData\Local\Temp\tmp7102491.exeC:\Users\Admin\AppData\Local\Temp\tmp7102491.exe23⤵PID:892
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"24⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\tmp7103942.exeC:\Users\Admin\AppData\Local\Temp\tmp7103942.exe25⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7105003.exeC:\Users\Admin\AppData\Local\Temp\tmp7105003.exe25⤵
- Modifies registry class
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\tmp7105767.exeC:\Users\Admin\AppData\Local\Temp\tmp7105767.exe26⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7106469.exeC:\Users\Admin\AppData\Local\Temp\tmp7106469.exe26⤵PID:856
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7103365.exeC:\Users\Admin\AppData\Local\Temp\tmp7103365.exe23⤵PID:1952
-
C:\Users\Admin\AppData\Local\Temp\tmp7104020.exeC:\Users\Admin\AppData\Local\Temp\tmp7104020.exe24⤵PID:2044
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"25⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\tmp7105471.exeC:\Users\Admin\AppData\Local\Temp\tmp7105471.exe26⤵PID:1780
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"27⤵PID:944
-
C:\Users\Admin\AppData\Local\Temp\tmp7106687.exeC:\Users\Admin\AppData\Local\Temp\tmp7106687.exe28⤵PID:1728
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"29⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\tmp7108169.exeC:\Users\Admin\AppData\Local\Temp\tmp7108169.exe30⤵PID:1752
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7108809.exeC:\Users\Admin\AppData\Local\Temp\tmp7108809.exe30⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\tmp7109433.exeC:\Users\Admin\AppData\Local\Temp\tmp7109433.exe31⤵PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7109714.exeC:\Users\Admin\AppData\Local\Temp\tmp7109714.exe31⤵PID:1560
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7107015.exeC:\Users\Admin\AppData\Local\Temp\tmp7107015.exe28⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\tmp7108185.exeC:\Users\Admin\AppData\Local\Temp\tmp7108185.exe29⤵
- Modifies registry class
PID:1628 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"30⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\tmp7109090.exeC:\Users\Admin\AppData\Local\Temp\tmp7109090.exe31⤵
- Drops file in System32 directory
- Modifies registry class
PID:1704 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"32⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\tmp7110026.exeC:\Users\Admin\AppData\Local\Temp\tmp7110026.exe33⤵PID:1716
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"34⤵PID:1600
-
C:\Users\Admin\AppData\Local\Temp\tmp7110541.exeC:\Users\Admin\AppData\Local\Temp\tmp7110541.exe35⤵PID:820
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7110775.exeC:\Users\Admin\AppData\Local\Temp\tmp7110775.exe35⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\tmp7112693.exeC:\Users\Admin\AppData\Local\Temp\tmp7112693.exe36⤵PID:2036
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"37⤵
- Drops file in System32 directory
- Modifies registry class
PID:1256 -
C:\Users\Admin\AppData\Local\Temp\tmp7113863.exeC:\Users\Admin\AppData\Local\Temp\tmp7113863.exe38⤵PID:2028
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"39⤵PID:1928
-
C:\Users\Admin\AppData\Local\Temp\tmp7114628.exeC:\Users\Admin\AppData\Local\Temp\tmp7114628.exe40⤵PID:552
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"41⤵
- Drops file in System32 directory
- Modifies registry class
PID:276 -
C:\Users\Admin\AppData\Local\Temp\tmp7115330.exeC:\Users\Admin\AppData\Local\Temp\tmp7115330.exe42⤵PID:1124
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"43⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\tmp7116360.exeC:\Users\Admin\AppData\Local\Temp\tmp7116360.exe44⤵PID:1012
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7116828.exeC:\Users\Admin\AppData\Local\Temp\tmp7116828.exe44⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\tmp7117171.exeC:\Users\Admin\AppData\Local\Temp\tmp7117171.exe45⤵PID:724
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7117452.exeC:\Users\Admin\AppData\Local\Temp\tmp7117452.exe45⤵PID:1056
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7115642.exeC:\Users\Admin\AppData\Local\Temp\tmp7115642.exe42⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\tmp7116126.exeC:\Users\Admin\AppData\Local\Temp\tmp7116126.exe43⤵PID:1356
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"44⤵
- Drops file in System32 directory
- Modifies registry class
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\tmp7117015.exeC:\Users\Admin\AppData\Local\Temp\tmp7117015.exe45⤵PID:1524
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"46⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\tmp7117966.exeC:\Users\Admin\AppData\Local\Temp\tmp7117966.exe47⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7119464.exeC:\Users\Admin\AppData\Local\Temp\tmp7119464.exe47⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\tmp7119963.exeC:\Users\Admin\AppData\Local\Temp\tmp7119963.exe48⤵PID:856
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7120369.exeC:\Users\Admin\AppData\Local\Temp\tmp7120369.exe48⤵
- Drops file in System32 directory
- Modifies registry class
PID:2036
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7117264.exeC:\Users\Admin\AppData\Local\Temp\tmp7117264.exe45⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\tmp7117920.exeC:\Users\Admin\AppData\Local\Temp\tmp7117920.exe46⤵PID:1520
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"47⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\tmp7119760.exeC:\Users\Admin\AppData\Local\Temp\tmp7119760.exe48⤵
- Drops file in System32 directory
- Modifies registry class
PID:1260 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"49⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\tmp7120728.exeC:\Users\Admin\AppData\Local\Temp\tmp7120728.exe50⤵PID:1264
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"51⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\tmp7121367.exeC:\Users\Admin\AppData\Local\Temp\tmp7121367.exe52⤵PID:944
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"53⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\tmp7122397.exeC:\Users\Admin\AppData\Local\Temp\tmp7122397.exe54⤵PID:1272
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7122678.exeC:\Users\Admin\AppData\Local\Temp\tmp7122678.exe54⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\tmp7123770.exeC:\Users\Admin\AppData\Local\Temp\tmp7123770.exe55⤵PID:1972
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"56⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\tmp7125158.exeC:\Users\Admin\AppData\Local\Temp\tmp7125158.exe57⤵PID:1380
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7126141.exeC:\Users\Admin\AppData\Local\Temp\tmp7126141.exe57⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\tmp7127451.exeC:\Users\Admin\AppData\Local\Temp\tmp7127451.exe58⤵PID:1676
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7127919.exeC:\Users\Admin\AppData\Local\Temp\tmp7127919.exe58⤵PID:240
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7123926.exeC:\Users\Admin\AppData\Local\Temp\tmp7123926.exe55⤵PID:1204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7121695.exeC:\Users\Admin\AppData\Local\Temp\tmp7121695.exe52⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\tmp7122100.exeC:\Users\Admin\AppData\Local\Temp\tmp7122100.exe53⤵PID:1164
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\tmp7123161.exeC:\Users\Admin\AppData\Local\Temp\tmp7123161.exe55⤵PID:888
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7123504.exeC:\Users\Admin\AppData\Local\Temp\tmp7123504.exe55⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\tmp7125033.exeC:\Users\Admin\AppData\Local\Temp\tmp7125033.exe56⤵PID:956
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:1776
-
C:\Users\Admin\AppData\Local\Temp\tmp7127264.exeC:\Users\Admin\AppData\Local\Temp\tmp7127264.exe58⤵PID:1812
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7128309.exeC:\Users\Admin\AppData\Local\Temp\tmp7128309.exe58⤵PID:1804
-
C:\Users\Admin\AppData\Local\Temp\tmp7128902.exeC:\Users\Admin\AppData\Local\Temp\tmp7128902.exe59⤵PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7129183.exeC:\Users\Admin\AppData\Local\Temp\tmp7129183.exe59⤵PID:860
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7125330.exeC:\Users\Admin\AppData\Local\Temp\tmp7125330.exe56⤵PID:820
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7122490.exeC:\Users\Admin\AppData\Local\Temp\tmp7122490.exe53⤵PID:560
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7120977.exeC:\Users\Admin\AppData\Local\Temp\tmp7120977.exe50⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\tmp7121742.exeC:\Users\Admin\AppData\Local\Temp\tmp7121742.exe51⤵PID:1528
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"52⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\tmp7122724.exeC:\Users\Admin\AppData\Local\Temp\tmp7122724.exe53⤵
- Drops file in System32 directory
- Modifies registry class
PID:892 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"54⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\tmp7123988.exeC:\Users\Admin\AppData\Local\Temp\tmp7123988.exe55⤵PID:1724
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"56⤵PID:1868
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7124284.exeC:\Users\Admin\AppData\Local\Temp\tmp7124284.exe55⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\tmp7126188.exeC:\Users\Admin\AppData\Local\Temp\tmp7126188.exe56⤵
- Modifies registry class
PID:1780 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"57⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\tmp7128668.exeC:\Users\Admin\AppData\Local\Temp\tmp7128668.exe58⤵PID:1928
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"59⤵PID:1916
-
C:\Users\Admin\AppData\Local\Temp\tmp7129370.exeC:\Users\Admin\AppData\Local\Temp\tmp7129370.exe60⤵PID:1792
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"61⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\tmp7130259.exeC:\Users\Admin\AppData\Local\Temp\tmp7130259.exe62⤵PID:596
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7130368.exeC:\Users\Admin\AppData\Local\Temp\tmp7130368.exe62⤵PID:276
-
C:\Users\Admin\AppData\Local\Temp\tmp7130727.exeC:\Users\Admin\AppData\Local\Temp\tmp7130727.exe63⤵PID:1352
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7131055.exeC:\Users\Admin\AppData\Local\Temp\tmp7131055.exe63⤵PID:680
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7186170.exeC:\Users\Admin\AppData\Local\Temp\tmp7186170.exe62⤵PID:1256
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7129744.exeC:\Users\Admin\AppData\Local\Temp\tmp7129744.exe60⤵PID:1752
-
C:\Users\Admin\AppData\Local\Temp\tmp7129978.exeC:\Users\Admin\AppData\Local\Temp\tmp7129978.exe61⤵PID:1500
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"62⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\tmp7130696.exeC:\Users\Admin\AppData\Local\Temp\tmp7130696.exe63⤵PID:1972
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"64⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\tmp7131226.exeC:\Users\Admin\AppData\Local\Temp\tmp7131226.exe65⤵PID:1168
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"66⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\tmp7132147.exeC:\Users\Admin\AppData\Local\Temp\tmp7132147.exe67⤵PID:1716
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7132849.exeC:\Users\Admin\AppData\Local\Temp\tmp7132849.exe67⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\tmp7133488.exeC:\Users\Admin\AppData\Local\Temp\tmp7133488.exe68⤵PID:1960
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"69⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\tmp7135345.exeC:\Users\Admin\AppData\Local\Temp\tmp7135345.exe70⤵PID:2040
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"71⤵PID:1176
-
C:\Users\Admin\AppData\Local\Temp\tmp7136062.exeC:\Users\Admin\AppData\Local\Temp\tmp7136062.exe72⤵PID:1512
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7136671.exeC:\Users\Admin\AppData\Local\Temp\tmp7136671.exe72⤵PID:1684
-
C:\Users\Admin\AppData\Local\Temp\tmp7138293.exeC:\Users\Admin\AppData\Local\Temp\tmp7138293.exe73⤵PID:1712
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7138465.exeC:\Users\Admin\AppData\Local\Temp\tmp7138465.exe73⤵PID:1624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7135594.exeC:\Users\Admin\AppData\Local\Temp\tmp7135594.exe70⤵PID:920
-
C:\Users\Admin\AppData\Local\Temp\tmp7135766.exeC:\Users\Admin\AppData\Local\Temp\tmp7135766.exe71⤵PID:2044
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"72⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\tmp7138137.exeC:\Users\Admin\AppData\Local\Temp\tmp7138137.exe73⤵PID:1552
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"74⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\tmp7138948.exeC:\Users\Admin\AppData\Local\Temp\tmp7138948.exe75⤵PID:1204
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"76⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\tmp7139978.exeC:\Users\Admin\AppData\Local\Temp\tmp7139978.exe77⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7140368.exeC:\Users\Admin\AppData\Local\Temp\tmp7140368.exe77⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\tmp7140618.exeC:\Users\Admin\AppData\Local\Temp\tmp7140618.exe78⤵
- Drops file in System32 directory
- Modifies registry class
PID:1528 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"79⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\tmp7141366.exeC:\Users\Admin\AppData\Local\Temp\tmp7141366.exe80⤵PID:1540
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"81⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\tmp7143457.exeC:\Users\Admin\AppData\Local\Temp\tmp7143457.exe82⤵PID:1160
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"83⤵PID:824
-
C:\Users\Admin\AppData\Local\Temp\tmp7144268.exeC:\Users\Admin\AppData\Local\Temp\tmp7144268.exe84⤵
- Drops file in System32 directory
- Modifies registry class
PID:1724
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7144658.exeC:\Users\Admin\AppData\Local\Temp\tmp7144658.exe84⤵PID:1144
-
C:\Users\Admin\AppData\Local\Temp\tmp7146000.exeC:\Users\Admin\AppData\Local\Temp\tmp7146000.exe85⤵PID:1384
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"86⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\tmp7146920.exeC:\Users\Admin\AppData\Local\Temp\tmp7146920.exe87⤵PID:956
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"88⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\tmp7148199.exeC:\Users\Admin\AppData\Local\Temp\tmp7148199.exe89⤵PID:1324
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"90⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\tmp7148917.exeC:\Users\Admin\AppData\Local\Temp\tmp7148917.exe91⤵PID:1732
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7149775.exeC:\Users\Admin\AppData\Local\Temp\tmp7149775.exe91⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\tmp7150929.exeC:\Users\Admin\AppData\Local\Temp\tmp7150929.exe92⤵PID:1552
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7151616.exeC:\Users\Admin\AppData\Local\Temp\tmp7151616.exe92⤵PID:1296
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7148465.exeC:\Users\Admin\AppData\Local\Temp\tmp7148465.exe89⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\tmp7149011.exeC:\Users\Admin\AppData\Local\Temp\tmp7149011.exe90⤵
- Drops file in System32 directory
- Modifies registry class
PID:552 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"91⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\tmp7149900.exeC:\Users\Admin\AppData\Local\Temp\tmp7149900.exe92⤵PID:1692
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"93⤵PID:1372
-
C:\Users\Admin\AppData\Local\Temp\tmp7151054.exeC:\Users\Admin\AppData\Local\Temp\tmp7151054.exe94⤵PID:1944
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7151569.exeC:\Users\Admin\AppData\Local\Temp\tmp7151569.exe94⤵
- Drops file in System32 directory
- Modifies registry class
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\tmp7153254.exeC:\Users\Admin\AppData\Local\Temp\tmp7153254.exe95⤵PID:1948
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"96⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\tmp7154159.exeC:\Users\Admin\AppData\Local\Temp\tmp7154159.exe97⤵PID:1676
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"98⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\tmp7155344.exeC:\Users\Admin\AppData\Local\Temp\tmp7155344.exe99⤵PID:2028
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"100⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\tmp7157996.exeC:\Users\Admin\AppData\Local\Temp\tmp7157996.exe101⤵PID:1764
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7158885.exeC:\Users\Admin\AppData\Local\Temp\tmp7158885.exe101⤵
- Drops file in System32 directory
- Modifies registry class
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\tmp7160570.exeC:\Users\Admin\AppData\Local\Temp\tmp7160570.exe102⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7161959.exeC:\Users\Admin\AppData\Local\Temp\tmp7161959.exe102⤵PID:824
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7156561.exeC:\Users\Admin\AppData\Local\Temp\tmp7156561.exe99⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\tmp7157481.exeC:\Users\Admin\AppData\Local\Temp\tmp7157481.exe100⤵PID:1572
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"101⤵PID:2040
-
C:\Users\Admin\AppData\Local\Temp\tmp7160477.exeC:\Users\Admin\AppData\Local\Temp\tmp7160477.exe102⤵PID:1356
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"103⤵
- Drops file in System32 directory
- Modifies registry class
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\tmp7161787.exeC:\Users\Admin\AppData\Local\Temp\tmp7161787.exe104⤵PID:1684
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"105⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\tmp7167777.exeC:\Users\Admin\AppData\Local\Temp\tmp7167777.exe106⤵PID:428
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"107⤵PID:1636
-
C:\Users\Admin\AppData\Local\Temp\tmp7171740.exeC:\Users\Admin\AppData\Local\Temp\tmp7171740.exe108⤵PID:944
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"109⤵PID:1868
-
C:\Users\Admin\AppData\Local\Temp\tmp7175094.exeC:\Users\Admin\AppData\Local\Temp\tmp7175094.exe110⤵PID:624
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7177059.exeC:\Users\Admin\AppData\Local\Temp\tmp7177059.exe110⤵PID:1764
-
C:\Users\Admin\AppData\Local\Temp\tmp7179103.exeC:\Users\Admin\AppData\Local\Temp\tmp7179103.exe111⤵PID:2012
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"112⤵PID:884
-
C:\Users\Admin\AppData\Local\Temp\tmp7182270.exeC:\Users\Admin\AppData\Local\Temp\tmp7182270.exe113⤵
- Drops file in System32 directory
- Modifies registry class
PID:1780 -
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"114⤵PID:1056
-
C:\Users\Admin\AppData\Local\Temp\tmp7184594.exeC:\Users\Admin\AppData\Local\Temp\tmp7184594.exe115⤵
- Drops file in System32 directory
- Modifies registry class
PID:956
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7186139.exeC:\Users\Admin\AppData\Local\Temp\tmp7186139.exe115⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\tmp7188260.exeC:\Users\Admin\AppData\Local\Temp\tmp7188260.exe116⤵PID:628
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7188650.exeC:\Users\Admin\AppData\Local\Temp\tmp7188650.exe116⤵PID:1772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7183050.exeC:\Users\Admin\AppData\Local\Temp\tmp7183050.exe113⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\tmp7184126.exeC:\Users\Admin\AppData\Local\Temp\tmp7184126.exe114⤵PID:1820
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7185140.exeC:\Users\Admin\AppData\Local\Temp\tmp7185140.exe114⤵PID:580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7180850.exeC:\Users\Admin\AppData\Local\Temp\tmp7180850.exe111⤵PID:1376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7172005.exeC:\Users\Admin\AppData\Local\Temp\tmp7172005.exe108⤵PID:284
-
C:\Users\Admin\AppData\Local\Temp\tmp7176498.exeC:\Users\Admin\AppData\Local\Temp\tmp7176498.exe109⤵
- Drops file in System32 directory
- Modifies registry class
PID:2040
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7177153.exeC:\Users\Admin\AppData\Local\Temp\tmp7177153.exe109⤵PID:1532
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7170741.exeC:\Users\Admin\AppData\Local\Temp\tmp7170741.exe106⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\tmp7172395.exeC:\Users\Admin\AppData\Local\Temp\tmp7172395.exe107⤵PID:1848
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"108⤵PID:1356
-
C:\Users\Admin\AppData\Local\Temp\tmp7179337.exeC:\Users\Admin\AppData\Local\Temp\tmp7179337.exe109⤵PID:1776
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7181053.exeC:\Users\Admin\AppData\Local\Temp\tmp7181053.exe109⤵PID:1724
-
C:\Users\Admin\AppData\Local\Temp\tmp7183612.exeC:\Users\Admin\AppData\Local\Temp\tmp7183612.exe110⤵PID:1872
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"111⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\tmp7185328.exeC:\Users\Admin\AppData\Local\Temp\tmp7185328.exe112⤵PID:596
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"113⤵PID:552
-
C:\Users\Admin\AppData\Local\Temp\tmp7186934.exeC:\Users\Admin\AppData\Local\Temp\tmp7186934.exe114⤵PID:1380
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"115⤵PID:556
-
C:\Users\Admin\AppData\Local\Temp\tmp7189789.exeC:\Users\Admin\AppData\Local\Temp\tmp7189789.exe116⤵PID:1868
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7190772.exeC:\Users\Admin\AppData\Local\Temp\tmp7190772.exe116⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\tmp7191989.exeC:\Users\Admin\AppData\Local\Temp\tmp7191989.exe117⤵PID:1472
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"118⤵PID:1072
-
C:\Users\Admin\AppData\Local\Temp\tmp7193206.exeC:\Users\Admin\AppData\Local\Temp\tmp7193206.exe119⤵PID:1560
-
C:\Windows\SysWOW64\notpad.exe"C:\Windows\system32\notpad.exe"120⤵PID:1376
-
C:\Users\Admin\AppData\Local\Temp\tmp7194781.exeC:\Users\Admin\AppData\Local\Temp\tmp7194781.exe121⤵
- Drops file in System32 directory
- Modifies registry class
PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\tmp7194875.exeC:\Users\Admin\AppData\Local\Temp\tmp7194875.exe121⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\tmp7195234.exeC:\Users\Admin\AppData\Local\Temp\tmp7195234.exe122⤵PID:1976
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-